Sudo Project

Sudo

23 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.04%
  • Published 12.01.2021 09:15:14
  • Last modified 21.11.2024 05:51:25

The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.

Exploit
  • EPSS 0.17%
  • Published 12.01.2021 09:15:14
  • Last modified 21.11.2024 05:51:25

selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in p...

Exploit
  • EPSS 87.27%
  • Published 29.01.2020 18:15:12
  • Last modified 21.11.2024 04:33:25

In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upst...

Exploit
  • EPSS 0.14%
  • Published 04.11.2019 19:15:10
  • Last modified 21.11.2024 00:05:25

There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by...

Exploit
  • EPSS 0.1%
  • Published 04.11.2019 16:15:11
  • Last modified 21.11.2024 04:33:31

Sudo through 1.8.29 allows local users to escalate to root if they have write access to file descriptor 3 of the sudo process. This occurs because of a race condition between determining a uid, and the setresuid and openat system calls. The attacker ...

Exploit
  • EPSS 86.13%
  • Published 17.10.2019 18:15:12
  • Last modified 21.11.2024 04:26:22

In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !r...

  • EPSS 0.07%
  • Published 29.05.2018 13:29:00
  • Last modified 21.11.2024 02:57:24

sudo before version 1.8.18p1 is vulnerable to a bypass in the sudo noexec restriction if application run via sudo executed wordexp() C library function with a user supplied argument. A local user permitted to run such application via sudo with noexec...

  • EPSS 0.88%
  • Published 10.10.2017 16:29:00
  • Last modified 20.04.2025 01:37:25

The SHA-2 digest support in the sudoers plugin in sudo after 1.8.7 allows local users with write permissions to parts of the called command to replace them before it is executed.

  • EPSS 0.17%
  • Published 05.06.2017 16:29:00
  • Last modified 20.04.2025 01:37:25

Todd Miller's sudo version 1.8.20p1 and earlier is vulnerable to an input validation (embedded newlines) in the get_process_ttyname() function resulting in information disclosure and command execution.

Exploit
  • EPSS 19.44%
  • Published 05.06.2017 14:29:00
  • Last modified 20.04.2025 01:37:25

Todd Miller's sudo version 1.8.20 and earlier is vulnerable to an input validation (embedded spaces) in the get_process_ttyname() function resulting in information disclosure and command execution.